MidTerm Trivia Quiz Module 1-4

MidTerm Trivia Quiz Module 1-4

University

20 Qs

quiz-placeholder

Similar activities

Cybersecurity Essentials Chapter 6 Review

Cybersecurity Essentials Chapter 6 Review

9th Grade - University

20 Qs

CO2517 Week 05

CO2517 Week 05

University

15 Qs

Backup Files

Backup Files

9th Grade - University

15 Qs

Threats, Issues, and Defenses - Ch 5

Threats, Issues, and Defenses - Ch 5

10th Grade - University

20 Qs

ISC2 - CC - Chapter 2 - Module 3

ISC2 - CC - Chapter 2 - Module 3

University

24 Qs

Module 14 (Fundamentals of Cybersecurity)

Module 14 (Fundamentals of Cybersecurity)

University

16 Qs

Cyber EOP - Cybersecurity Lifecycle By Mr. B

Cyber EOP - Cybersecurity Lifecycle By Mr. B

12th Grade - University

20 Qs

ISC2 - CC - Chapter 2 - Module 2

ISC2 - CC - Chapter 2 - Module 2

University

21 Qs

MidTerm Trivia Quiz Module 1-4

MidTerm Trivia Quiz Module 1-4

Assessment

Quiz

Computers

University

Easy

Created by

Nicole Behner

Used 5+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Defense is the risk control strategy that attempts to prevent the exploitation of a vulnerability.

False

True

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which document describes how, in the event of a disaster, critical business functions continue at an alternate location while the organization recovers its ability to function at the primary site? Select the best answer.

Disaster Recovery Plan

Business Continuity Plan

Emergency Action Plan

Contingency Plan

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The three critical elements of the C.I.A triad are:

Confidentiality, Integrity, and Accessibility

Confidentiality, Integrity, and Availability

Credibility, Integrity, and Availability

Confidentiality, Identity, and Availability

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A targeted solution to misuse a specific vulnerability is called an __________.

exploit

patch

workaround

remediation

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

________ is the protection of the confidentiality, integrity, and availability of information.

Information security

NIST

Data security

Contingency planning

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The overall planning and development of the contingency planning process is handled by which group?

Contingency Planning Management Team

Crisis Management Team

Emergency Response Team

Risk Assessment Team

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What law attempts to protect the confidentiality and security of healthcare data by establishing and enforcing standards?

FISMA

HITECH

FERPA

HIPAA

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?